{"id":353215,"date":"2024-10-20T00:56:46","date_gmt":"2024-10-20T00:56:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-32017\/"},"modified":"2024-10-26T01:02:27","modified_gmt":"2024-10-26T01:02:27","slug":"bs-iso-iec-9594-32017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-32017\/","title":{"rendered":"BS ISO\/IEC 9594-3:2017"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Paired Recommendations | International Standards equivalent in technical content <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 2.3 Additional references 3 Definitions 3.1 OSI Reference Model security architecture definitions 3.2 Basic Directory definitions 3.3 Directory model definitions 3.4 Directory information base definitions 3.5 Directory entry definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.6 Name definitions 3.7 Distributed operations definitions 3.8 Abstract service definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Abbreviations 5 Conventions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6 Overview of the Directory service 7 Information types and common procedures 7.1 Introduction 7.2 Information types defined elsewhere <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.3 Common arguments <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.3.1 Critical extensions <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.3.2 Family grouping 7.4 Common results <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.5 Service controls <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.6 Entry information selection <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.6.1 Use of contextSelection or context selection defaults 7.6.2 Evaluation of contextSelection 7.6.3 Evaluation of a TypeAndContextAssertion <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.6.4 Family Return 7.7 Entry information 7.7.1 Entry information data type <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.7.2 Family information in entry information <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.8 Filter 7.8.1 Filter parameter <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.8.2 Filter item <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.8.3 Evaluating filters with family information <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.9 Paged results <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.10 Security parameters <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.11 Common elements of procedure for access control 7.11.1 Common elements of procedure for basic access control 7.11.1.1 Alias dereferencing 7.11.1.2 Return of Name Error <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.11.1.3 Non-disclosure of the existence of an entry 7.11.1.4 Return of Distinguished Name 7.11.2 Common elements of procedure for rule-based-access-control 7.11.2.1 Accessing an entry (entry level permission) 7.11.2.2 Returning the name of an entry 7.11.2.3 Alias dereferencing 7.11.2.4 Return of Name Error (noSuchObject) 7.11.2.5 Accessing an attribute <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.11.2.6 Deleting information 7.11.2.7 Invoking search-rules 7.11.3 Family information 7.12 Managing the DSA Information Tree 7.13 Procedures for families of entries <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8 Directory authentication 8.1 Simple authentication procedure <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 8.1.1 Generation of protected identifying information <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 8.1.2 Procedure for protected simple authentication 8.2 Password policy 8.2.1 Introduction <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 8.2.2 Operational attributes and procedures <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8.2.3 Password history <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 9 Bind, Unbind operations, Change Password and Administer Password operations 9.1 Directory Bind 9.1.1 Directory Bind syntax <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 9.1.2 Directory Bind arguments <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 9.1.3 Directory Bind results <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 9.1.4 Directory Bind errors 9.2 Directory Unbind 10 Directory Read operations 10.1 Read 10.1.1 Read syntax <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 10.1.2 Read arguments 10.1.3 Read results <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 10.1.4 Read errors 10.1.5 Read operation decision points for basic access control 10.1.5.1 Error returns 10.1.5.2 Non-disclosure of incomplete results 10.1.6 Read operation decision points for rule-based access control <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 10.2 Compare 10.2.1 Compare syntax <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 10.2.2 Compare arguments 10.2.3 Compare results 10.2.4 Compare errors 10.2.5 Compare operation decision points for basic access control <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 10.2.5.1 Error returns 10.2.6 Compare operation decision points for rule-based access control 10.2.7 Remote checking of password <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 10.3 Abandon 11 Directory Search operations 11.1 List 11.1.1 List syntax <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 11.1.2 List arguments <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 11.1.3 List results <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 11.1.4 List errors 11.1.5 List operation decision points for basic access control <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 11.1.6 List operation decision points for rule-based access control 11.2 Search 11.2.1 Search syntax <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 11.2.2 Search arguments <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 11.2.3 Search results 11.2.4 Service administration 11.2.5 Search errors <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 11.2.6 Search operation decision points for basic access control <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 11.2.6.1 Search operation decision points for basic-access-control in the presence of additional searches <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 11.2.6.2 Alias dereferencing during Search 11.2.6.3 Non-disclosure of incomplete results 11.2.7 Search operation decision points for rule-based access control 12 Directory Modify operations <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 12.1 Add Entry 12.1.1 Add Entry syntax 12.1.2 Add Entry arguments <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 12.1.3 Add Entry results 12.1.4 Add Entry errors 12.1.5 Add operation decision points for basic access control 12.1.5.1 Error returns 12.1.6 Add Entry operation decision points for rule-based-access-control <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 12.2 Remove Entry 12.2.1 Remove Entry syntax 12.2.2 Remove Entry arguments 12.2.3 Remove Entry results <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 12.2.4 Remove Entry errors 12.2.5 Remove Entry operation decision points for basic access control 12.2.6 Remove Entry operation decision points for rule-based access control 12.3 Modify Entry 12.3.1 Modify Entry syntax <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 12.3.2 Modify Entry arguments <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 12.3.3 Modify Entry results <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 12.3.4 Modify Entry errors 12.3.5 Modify Entry operation decision points for basic access control 12.3.5.1 Error returns <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 12.3.6 Modify Entry operation decision points for rule-based access control 12.4 Modify DN 12.4.1 Modify DN syntax <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 12.4.2 Modify DN arguments <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 12.4.3 Modify DN results 12.4.4 Modify DN errors 12.4.5 ModifyDN decision points for basic access control 12.4.5.1 Error returns 12.4.6 Modify DN operation decision points for rule-based access control 12.5 Change Password 12.5.1 Change Password syntax <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 12.5.2 Change Password arguments 12.5.3 Change Password results 12.5.4 Change Password errors 12.6 Administer Password 12.6.1 Administer Password syntax <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 12.6.2 Administer Password arguments 12.6.3 Administer Password results 12.6.4 Administer Password errors 13 Operations for LDAP messages 13.1 LDAP Transport operation 13.1.1 LDAP Transport syntax <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 13.1.2 LDAP Transport arguments <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 13.1.3 LDAP Transport results <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 13.2 Linked LDAP operation 13.2.1 Linked LDAP syntax 13.2.2 Linked LDAP arguments 13.2.3 Linked LDAP results 14 Errors 14.1 Error precedence <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 14.2 Abandoned 14.3 Abandon Failed <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 14.4 Attribute Error <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 14.5 Name Error 14.6 Referral <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 14.7 Security Error <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 14.8 Service Error <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 14.9 Update Error <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 15 Analysis of search arguments 15.1 General check of search filter <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 15.2 Check of request-attribute-profiles <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 15.3 Check of controls and hierarchy selections <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 15.4 Check of matching use <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | C.1 Single family example <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | C.2 Multiple families example C.2.1 Filter example 1 <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | C.2.2 Filter example 2 C.2.3 Filter example 3 <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | C.2.4 Filter example 4 <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Open Systems Interconnection. The Directory – Abstract service definition<\/b><\/p>\n |